Computer and information sciences topic list of research papers
-
A New Machine-checked Proof of Strong Normalisation for Display Logic
Abstract We use a deep embedding of the display calculus for relation algebras δRA in the logical framework Isabelle/HOL to formalise a new, machine-checked, proof of strong normalisation and cut-elimination for δRA which does not use measures on...
2004 / Jeremy E. Dawson, Rajeev Goré -
Declarative Debugging for Encapsulated Search
Abstract Declarative debugging has been proposed as a suitable technique for developing debuggers in the context of declarative languages. However, to become really useful debuggers must be able to deal with those parts of the languages that have no ...
2004 / Rafael Caballero, Wolfgang Lux -
A case for po-manifolds — in chase after a good topological model for concurrency
Abstract It has repeatedly been argued that the semi-cubical complexes 3 3 The italicized technical terms in...
2004 / Stefan Sokołowski -
Two formalisms of extended possibilistic logic programming with context-dependent fuzzy unification
Abstract Possibilistic logic is a logic of uncertainty where a certainty degree between 0 and 1, interpreted as a lower bound of a necessity measure, is attached to each classical formula. In this paper we present a comparative description of two...
2004 / Teresa Alsinet, Lluís Godo, Sandra Sandri -
Linear Time Computable Problems and Logical Descriptions
Abstract It is a general problem to investigate the trade off between the complexity of algorithmic problems, the structure of the input objects and the expressive power of problem description languages. The article concentrates on linear time...
2005 / Detlef Seese -
Mobile Code for Key Propagation
Abstract We introduce the concept of keylets, which are mobile code used to control the propagation of keys in a system, as well as a technique for mobile agent code security that involves encryption of partitioned code components. Keylets are used...
2004 / Hock Kim Tan, Luc Moreau -
Automated Facts Generation From Raw Data:
Abstract One of the problems in developing ANDES, an expert system for diagnosis of the US Air Force phased-array satellite ground station antenna system at the Antenna Repair Facility of McClellan Air Force Base, is how to automatically generate...
2004 / Du Zhang, Vo Lee, Joseph Friedel, Robert Keyser -
Model Checking UML State Machines and Collaborations
Abstract The Unified Modeling Language provides two complementary notations, state machines and collaborations, for the specification of dynamic system behavior. We describe a prototype tool, HUGO, that is designed to automatically verify whether...
2004 / Timm Schäfer, Alexander Knapp, Stephan Merz -
Formal Synthesis of Real-Time Embedded Software by Time-Memory Scheduling of Colored Time Petri Nets1 1This work was partially supported by research project grant NSC-90-2215-E-194-009 from the National Science Council, Taiwan, ROC.
Abstract With the computerization of most daily-life human amenities such as home appliances, the software in a real-time embedded system now accounts for as much as 70% of a system design. On one hand, this increase in software has made embedded...
2004 / Pao-Ann Hsiung, Chuen-Hau Gau -
Specifying Coalgebras with Modal Logic
Abstract We propose to use modal logic as a logic for coalgebras and discuss it in view of the work done on coalgebras as a semantics of object-oriented programming. Two approaches are taken: First, standard concepts of modal logic are applied to...
2004 / Alexander Kurz -
Recognizing Energy-related Activities Using Sensors Commonly Installed in Office Buildings
Abstract Automated control based on user activities and preferences could reduce energy consumption of office buildings. In this paper, we investigated generalisation properties of an office activity recognition approach using sensors that are...
2013 / Marija Milenkovic, Oliver Amft -
Survey of Object Detection Methods in Camouflaged Image
Abstract Camouflage is an attempt to conceal the texture of a foreground object into the background image frame texture. Camouflage detection method or Decamouflaging method is basically used to detect foreground object hidden in the background...
2013 / Sujit K. Singh, Chitra A. Dhawale, Sanjay Misra -
Distributed synthesis is simply undecidable
Abstract The distributed synthesis problem of safety and reachability languages is known to be undecidable. In this article, we establish that this is the case for very simple languages, namely for safety and reachability specifications in the...
2013 / Sven Schewe -
Forecasting of Rainfall Using Time Delay Neural Network in Tizi-Ouzou (Algeria)
Abstract In order to improve the management of water resources in the region of Tizi-Ouzou (Algeria), monthly rainfall data recorded at the meteorological station of Tizi-Ouzou during 1996/2010 have been processed using Time Delay Neural Network...
2013 / Khalida Benmahdjoub, Zohra Ameur, Mina Boulifa -
Redundancy and Criticality based Scheduling in Wireless Video Sensor Networks for Monitoring Critical Areas
Abstract Applications for monitoring critical areas, based on Wireless Video Sensor Networks (WVSN), require simultaneously good level of coverage of the entire region of deployment, high frame capture speed and low power consumption in order to...
2013 / Ali Benzerbadj, Bouabdellah Kechar -
A flag representation for finite collections of subspaces of mixed dimensions
Abstract Given a finite set of subspaces of R n ...
2014 / Bruce Draper, Michael Kirby, Justin Marks, Tim Marrinan, Chris Peterson -
Virtual Ergonomic Assessment of First Saudi Arabian Designed Car in a Semi-Immersive Environment
Abstract During the last decade human factors is drawing more attention in the design, engineering, production, and maintenance of new industrial products especially in automotive industry. Ergonomic quality is becoming a critical criterion for the...
2013 / Mustufa H. Abidi, A.M. El-Tamimi, A.M. Al-Ahmari, S.M. Darwish, M.S. Rasheed -
Assignment of Static Light Trail in WDM Networks
Abstract In this paper a heuristic algorithm is proposed for assigning light trail in a WDM mesh topology. For the given network and connection requests, a minimum number of light trail is to be assigned such that all the given connection requests...
2014 / Sampa Rani Bhadra, Utpal Biswas, Mrinal Kanti Naskar -
Preface2013 / Paola Giannini, Erik de Vink
-
Modeling Temporal Pattern and Event Detection using Hidden Markov Model with Application to a Sludge Bulking Data
Abstract This paper discusses a method of modeling temporal pattern and event detection based on Hidden Markov Model (HMM) for a continuous time series data. We also provide methods for checking model adequacy and predicting future events. These...
2012 / Naveen K. Bansal, Xin Feng, Wenjing Zhang, Wutao Wei, Yuanhao Zhao